Summary of the invention
Therefore, the objective of the invention is to address the above problem, a kind of charging method that can easily pay cost and infosystem etc. are provided.
The described charging method utilization of theclaim 1 that proposes in order to address the above problem is in the charge system of the information that can be presented at the conduct charging object on the mobile phone-when the charging object information downloads on the mobile phone download of this charging object information is chargeed, functioning in an acting capacity of can be through the charging to the user of terminal of center that network connects and the center-side between the terminal, wherein, judge that the user is input to terminal and whether be the charging object information that downloads on the mobile phone from the information that terminal sends to the center, under the situation that is the charging object information, will confirm that the predetermined data that should send after the charging sends to terminal.
Therefore, the user passes through to buy the charging object information with mobile phone, from the charging object information that the terminal input handset shows, and the predetermined data that should send after the enough terminals of energy easily obtain confirming to charge (for example paid content).For example, the cost that charging that can enough mobile phones comes the paid content that payment terminal easily uses etc. also can use paid content etc. immediately.
For example PC is being used as under the situation of terminal, PC can show big picture etc., and can realize various functions, so be fit to provide the information or the paid content of commodity, and under the situation of PC, the charging means that are used for the cost of payment for merchandise or paid content need be used credit card or bank transfer etc., are difficult to use concerning the user.And mobile phone is not suitable for providing the information or the paid content of commodity sometimes for example because reason such as little, the function of picture is few, and is complete but mobile operator or ISP (ISP) etc. carry out the charge system of download charging.Like this, the cost of the charging object information that charge system will be chargeed according to the download of charging object information is for example with the usage charges of the usage charges of mobile phone or ISP, add up to the charging (for example every 1 month) during regulation from various website data download, waits from user's account and settles accounts.Therefore, the user can come by the cost of payment charging object information easily from the operator payment cost of website to the center.Particularly, can easily realize the clearing of small amount cost with low price.
For example, the ISP of the data communication of the operator at center and mobile operator or managing mobile phone is signatory, when having downloaded the charging object information, the user is chargeed, for example part or all of the cost of every month centralized charging and transfer into the account etc. of operator.And the center for example is provided with: the 1st server possesses the function of storing or generating the charging object information; With the 2nd server, as described inscheme 1, " information that is input to above-mentioned terminal and sends to the center from above-mentioned terminal the user is to download under the situation of the charging object information on the above-mentioned mobile phone, and the predetermined data that should send after will confirming to charge sends to above-mentioned terminal ".Scheme 1 described " predetermined data that should send after confirming to charge " for example is presented at the information of the information on the terminal, the information that cost has been paid in expression, paid content etc. for the picture that is used for address for service that will the input commodity or is used to be directed to the information (for example link information, redirection information) of these information.
Like this, buy the user under the situation of commodity or information, the charging object information that for example only needs to send from mobile phone-downloaded from the 1st server also shows, the charging object information that shows is input to terminal, for example send this charging object information through network to the 2nd server from terminal, the picture that the user just can access the address for service that the information of regulation-be used for will the input commodity is presented at the information of the information on the terminal, the information that cost has been paid in expression, paid content etc.
Moreover, as concrete charging method, for example can adopt the charging method shown in the claim 2.According toscheme 2 described charging methods, the charging object information is sent to mobile phone; Follow the accounting processing of the transmission of charging object information; Receive information from terminal; In the information that receives from terminal is to send under the situation of charging object information of mobile phone, and the predetermined data that should send after will confirming to charge sends to terminal.
Thus, the user can the download charging when receiving the charging object information with mobile phone be used to the charging of information of the regulation at the center that obtains.Therefore, can provide a kind of charging method that can easily settle accounts cost.
The charging object information can be input to terminal information for the user.For example be preferably sequence number.In addition, shown in scheme 3, preferably the telephone number according to mobile phone generates the charging object information.
This charging method for example can realize with described infosystems such as claims 5~11.
Scheme 5 described infosystems comprise: charging object information transmit block sends to mobile phone with the charging object information; The charging parts, the cost that carries out accounting processing-above-mentioned charging object information transmit block is sent to the charging object information of above-mentioned mobile phone charges; Receiving-member receives information through network from terminal; Judging part judges whether above-mentioned receiving-member is the charging object information that above-mentioned charging object information transmit block sends from the information that terminal receives; And data unit, be judged to be under the situation that information that above-mentioned receiving-member receives from terminal is the charging object information that sends of above-mentioned charging object information transmit block at above-mentioned judging part, the predetermined data that should send after will confirming to charge sends to above-mentioned terminal.
Therefore, the user passes through to receive charging object information and demonstration with mobile phone, the charging object information that shows is input to terminal concurrence send, the predetermined data that should send after the enough terminals of energy obtain confirming to charge.That is, the charging object information of user by showing, the predetermined data that should send after the enough terminals of energy obtain confirming to charge (for example paid content) from the terminal input handset.Like this, can utilize the charge system of to mobile phone-downloaded charging object information the time, chargeing function in an acting capacity of can be between center that network connects and terminal the user of terminal should be to the charging of the cost of center-side payment, can be easily to mobile phone-downloaded the user of charging object information for example send the predetermined data that should send after the affirmation charging such as paid content.That is, can easily pay cost.
In addition, for example according to scheme 5 described infosystems, buy the user under the situation of commodity and information, the user only need make mobile phone receive the charging object information and show, the charging object information that shows is input to terminal, should the charging object information send to infosystem from terminal, and just can for example obtain predetermined data-be used to the accept data or the information of these commodity.Like this, can utilize mobile phone easily to settle accounts cost, the data after obtaining buying.
Particularly shown inscheme 6, comprising: the charging object information generates parts, generates the charging object information that charging object information transmit block sends; With charging object information memory unit, storage charging object information generates the charging object information that parts generate; Whether judging part is stored in the charging object information memory unit according to the information that receives from above-mentioned terminal is carried out above-mentioned judgement.
By doing like this, can change the charging object information at any time, can easily prevent illegal use.
Particularly shown in scheme 7, the charging object information generates parts and preferably generates above-mentioned charging object information according to the telephone number of the mobile phone of the transmission object of charging object information.Like this, charging object information that for example can easily efficiency confirmed can easily prevent illegal use.
For example, under the situation that the price that downloads to paid content that charging object information on the mobile phone and terminal use etc. equates,, can use this paid content etc. like this by import this charging object information from terminal, but under different situations, the too much and not enough of cost takes place.Therefore, preferably shown in scheme 8, generate 1 charging object information and send to mobile phone according to a plurality of charging object information, perhaps generate a plurality of charging object information and send to mobile phone according to 1 charging object information shown in scheme 9, making it possible to adjust should be too much with not enough.
Above-mentioned each parts can be realized with a plurality of processing element.Particularly preferably shown inclaim 10, the network that above-mentioned mobile phone has through communication common carrier is obtained above-mentioned charging object information, on the above-mentioned terminal connectable to network; Comprise: communication common carrier end processing element comprises that above-mentioned charging object information generates parts, above-mentioned charging object information transmit block and above-mentioned charging parts, by above-mentioned communication common carrier management; Content provides the end processing element, comprises above-mentioned receiving-member and above-mentioned data unit, and above-mentioned the Internet is carried out the reception of above-mentioned receiving-member or the transmission of above-mentioned transmit block; And authentication merchant end processing element, comprise above-mentioned charging object information memory unit and above-mentioned judging part.
Like this, by generating the charging object information with communication common carrier end processing element, send to mobile phone, can for example use so-called hand set charging system that communication common carrier has or the existing charging means such as usage charges charge system of ISP easily to carry out accounting processing.Moreover, by charging object information memory unit and judging part are included in the authentication merchant end processing element, can provide the end processing element to separate the management of charging object information, the object information of safety management charging easily from communication common carrier end processing element and content.Particularly under the situation of structure, can easily protect personal information such as cell-phone telephone number with claim 7.For example the most handy special line communicates the communication between company's end processing element and the authentication merchant end processing element.Exchanger, charge object information like this, more safely.
For example under the situation of mobile operator or ISP operation information system, accounting processing for example can be during regulation (for example every 1 month) with the usage charges of the usage charges of above-mentioned mobile phone or ISP add up to, from the processing of user's clearing such as account.In addition, under the situations such as company operation information system different with mobile operator with charge system or ISP, accounting processing for example can be to be used to make charge system that the processing that the user of mobile phone charges is got final product shown in scheme 11.As this processing, the processing etc. that sends charge information through network to charge system is for example arranged.
Shown in scheme 12,, for example be preferably text datas such as sequence number though the charging object information for example also can be view data or voice data.Like this, the user only needs text data to be input to terminal concurrence to deliver to infosystem to the mobile phone-downloaded text data, just can access the information of regulation.Therefore, can extremely easy and easily pay and obtain to pay after data.
Can be shown inscheme 4, the processing procedure of each described charging method can be made the program that is used to make the computing machine execution in theimplementation 1~3.In addition, can be shown in scheme 13, active computer comes under the situation of the function of each described infosystem in the implementation 5~12, for example makes the program that computing machine is carried out.Under the situation of this program, for example can record on the computer-readable recording mediums such as floppy disk, magneto-optic disk, CD-ROM, hard disk, ROM, RAM, be loaded into where necessary and carry out on the computing machine, perhaps carry out through network download.
Embodiment
Below, with accompanying drawing the application embodiments of the invention are described.Embodiments of the present invention at all are not limited to following embodiment certainly, can adopt variety of way in technical scope of the present invention.
[the 1st embodiment]
As shown in Figure 1, theinfosystem 1 of present embodiment comprises:central terminal server 10, be equivalent to the infosystem in claims, and be equivalent to the center;Client PC 20 can 50 communicate through the Internet with thiscentral terminal server 10, is equivalent to the terminal in claims; Andmobile phone 30, can communicate through communication common carrier end system 40 andcentral terminal server 10.
Central terminal server 10 is general server computers, and built-in CPU, ROM, RAM, hard disk, various IO interface etc. possess the function of Web server.That is,central terminal server 10 sends to client PC 20 according to the visit of the browser that possesses with client PC 20 to page info with the page info of storage in thecentral terminal server 10 or the page info ofcentral terminal server 10 generations.
Client PC 20 is the general personal computers that possess the function that is connected on the Internet 50, built-in CPU, ROM, RAM, hard disk, display, various IO interface etc., possess browser and e-mail function, possess on the access the Internet 50central terminal server 10 that connects and receive page info (for example wait and describe) and be presented on the display or receive the function that various content informations use with HTML.
Mobile phone 30 possesses browser, is to possess on the access the Internet 50 Web server that connects, receive the general mobile phone from the information of Web server and the function that shows.
Communication common carrier end system 40 possesses electric wave that reception sends frommobile phone 30, carry out circuit control or the information relay that will send frommobile phone 30 to the Internet 50 or will be from the Internet 50 data that mail tomobile phone 30 from the Internet 50 functions that are relayed to mobile phone 30.In addition, possess the function of carrying out following accounting processing: for the expense of operator when the user ofmobile phone 30 takes overmobile phone 30 fromcentral terminal server 10 download charging object information for the center, the expense during with the download charging object information is added to this user and uses on the expense at this center.Then, the expense that will use each center every the telephone expenses of themobile phone 30 of specified time limit (for example 1 month) etc. and this user altogether, clearing mechanism end computing machines 60 such as request bank or credit card company are transferred from user's account.Then, under the situation of usage charges of having transferred, the account who asks it to add up to all users to use the expense at this center and transfer into the operator ofcentral terminal server 10.
Under the situation of the paid content that the user provides with the Web server of the browser accesscentral terminal server 10 of client PC 20, at first, downloading as the cost with this paid content withmobile phone 30 is the sequence number (also can be referred to as password) of the charging object information of price.At this moment, communication common carrier end system 40 carries out the above-mentioned accounting processing-price of this sequence number is chargeed.
For example, the user is frommobile phone 30 visitcentral terminal server 10, and the indication with the sequence number of 80 yen of these prices is bought in input.Mobile phone 30 download sequence number, this sequence number for example is shown as " SN * * * * ".Consequently, carried out 80 yen charging by above-mentioned accounting processing.
The user is with the browser accesscentral terminal server 10 of client PC 20, shows the page of the inlet that is used to show paid content.The sequence number that shows to thispage input handset 30 from the keyboard of client PC 20 etc. " SN * * * * " sends to browser then.
10 of central terminal server that receive sequence number " SN * * * * " are under the consistent situation of the sequence number that receives and the sequence number that sends tomobile phone 30 " SN * * * * ", and just the page info with paid content sends to client PC 20.
In the case, the sequence number unanimity is so show paid content on the browser of client PC 20.
Like this, can come together to settle accounts the paid content that thecentral terminal server 10 on the Internet 50 provides with the telephone expenses of mobile phone 30.Thus, do not send credit number, just can easily carry out the charging and the clearing of few volume with low cost.
In the present embodiment, download the sequence number corresponding, but also can for example generate this sequence number with being associated for information about of user with the amount of money of cost.For example when sequence number being downloaded on themobile phone 30,central terminal server 10 obtains the telephone number ofmobile phone 30 through communication common carrier end system 40, generates sequence number with this telephone number.Central terminal server 10 is associated sequence number, telephone number and the price (the charging amount of money) that generates and stores in the database (DB) then.Sending from client PC 20 under the situation of telephone number and sequence number then, with the price of the telephone number that sends and sequence number and paid content, with database in sequence number, telephone number and the price of storing compare, confirm whether correct after, only under correct situation, just the page info of paid content is sent to client PC 20.Like this, can prevent user's personation etc.
Under the situation that the price of the paid content that the cost that downloads to the sequence number on themobile phone 30 like this and client PC 20 used equates, can use this paid content by importing this sequence number; But under different situations, the too much and not enough of cost takes place.Therefore, preferably generate 1 sequence number (below be referred to as in conjunction with), perhaps generate a plurality of sequence numbers (below be referred to as separations) according to 1 sequence number according to a plurality of sequence numbers, adjust this too much with deficiency.
Fig. 2 illustrates the combination of this sequence number and handles.
User's operatinghandset 30 is visited the password ofcentral terminal server 10 in conjunction with website from mobile phone 30.Central terminal server 10 sends the page info that comprises the form of importing 2 sequence numbers according to this visit to mobile phone 30.Mobilephone 30 shows this form, reminds the user to import 2 sequence numbers.Mobile phone 30 sends tocentral terminal server 10 with 2 sequence numbers of user's input.
Central terminal server 10 is carried out processing shown in Figure 2 under the situation that receives these 2 sequence numbers.
In S10, judge whether first sequence number that receives is present in the database (DB).(S10: "Yes"), transfer to S11 under situation about existing; And under non-existent situation (S10: "No"), transfer to S21.
In S11, same with S10, judge whether second sequence number that receives is present in the database (DB).(S10: "Yes"), transfer to S12 under situation about existing; And under non-existent situation (S10: "No"), transfer to S21.
In S12, from database, obtain the price of first sequence number; In the S13 that follows, from database, obtain the price of second sequence number.Then, in the S14 that follows, the price of the price of first sequence number and second sequence number is calculated the price of new sequence number in the Calais mutually.In the S15 that follows, judge whether the price of this new sequence number is present in the Pricedata.The tabulation of in store in advance price of chargeing in this Pricedata.For example, in Pricedata, storing price data such as 100 yen, 300 yen, 500 yen.Be present in (S15: "Yes"), transfer to S16 under the situation in this Pricedata in the price of new sequence number; And under non-existent situation (S15: "No"), transfer to S21.
In S16, generate new sequence number.Then, in the S17 that follows, new sequence number is associated with its price and is registered in the database.In the S18 that follows, from database, delete first sequence number then; In S19, deletion second sequence number from database.
Then, in the S20 that follows, new sequence number is sent tomobile phone 30.
And in S21, requestmobile phone 30 retransmission sequence number.For example, with reminding the message of retransmitting, send the aforementioned page info that comprises the form of importing 2 sequence numbers.
Like this, can obtain 1 new sequence number, so can easily make the price of sequence number consistent with the price of paid content according to a plurality of sequence numbers.For example also can easily make up the sequence number of buying in advance uses.
Then, Fig. 3 and Fig. 4 illustrate the process flow diagram of the separating treatment of sequence number.
User'soperating handset 30 is from the password separation website ofmobile phone 30 visit central terminal server 10.Centralterminal server 10 sends the page info that comprises list entries number and cut apart the form of price according to this visit to mobile phone 30.Mobile phone 30 shows these forms, reminds user input sequencenumber.Mobile phone 30 sends to centralterminal server 10 with the sequence number of user's input.
Centralterminal server 10 is carried out processing shown in Figure 3 receiving under the situation of this sequence number.
In S30, judge whether the sequence number that receives is present in the database (DB).(S30: "No"), transfer to S31, requestmobile phone 30 is retransmitted password and is finished this processing under situation about not being present in the database.And (S30: "Yes"), transfer to S32 under the situation in being present in database.
In S32, judge cutting apart price and whether being present in the Pricedata (S32: "Yes"), transfer to S33 under situation about existing of receiving; And under non-existent situation (S32: "No"), transfer to S36.
In S33, from database, obtain the price of the sequence number that receives; In S34, from the price of the sequence number obtained, deduct and cut apart price, the price of the sequence number of looking for novelty.
In the S35 that follows, judge whether the price of new sequence number is present in the database.(S35: "Yes"), transfer to the S37 of Fig. 4 under the situation in being present in database; And under situation about not being present in the database (S35: "No"), transfer to S36.
In S36, requestmobile phone 30 is retransmitted and is cut apart price and finish this processing.
In S37, generate new sequence number; In S38, generate sequence of partitions number.Then, in S39, new sequence number is associated with its price and is registered in the database.Among this external S40, sequence of partitions number is associated with its price and is registered in the database.Then, in S41, the sequence number that deletion receives from database; In S42, new sequence number and sequence of partitions number are sent tomobile phone 30.
Like this, can cut apart 1 sequence number and obtain a plurality of sequence numbers, so can easily make the price of sequence number consistent with the price of paid content.
Except the structure of Fig. 1,infosystem 1 of the present invention also can adopt various structures.For example centralterminal server 10 also can be included in the communication common carrier end system 40.In addition, as shown in Figure 5,, also can communicate the accounting processing of company's end system 40 by ISP end system 70 communicating by letter under the situation that ISP end system 70 carries out ofmobile phone 30 and central terminal server 10.Like this, can come the expense of the paid content of settlement center'send server 10 with the usage charges of ISP.
[the 2nd embodiment]
As shown in Figure 6, theinfosystem 2 of present embodiment has:mobile phone 110; Communication common carrierend computing machine 120/ passwordstorage computation machine 130/ password authentication computing machine 170 is equivalent to the infosystem in claims, is equivalent to the center; Thewebserver 160; AndNetwork Termination #1 50, be equivalent to the terminal in claims.
Mobile phone 110 is general mobile phones that the user has, and except telephony feature, also possesses by the IP packet communication and comes content that comprises in the download communication companyend computing machine 120 and the communication function that shows or carry out.
Communication common carrierend computing machine 120 is computing machines that mobile operator has, and sends content-data according to the request frommobile phone 110, carries out accounting processing-follow the transmission of this content-data and the charging (being called download charging) that takes place.As this system, for example known have i-mode (registered trademark) that the NTT DoKoMo of Co., Ltd. provides etc.
Communication common carrierend computing machine 120 is held in the palm by password management commerce commission and issues password as this content-data.In addition, in communication common carrierend computing machine 120, comprise thebilling database 125 that is used to preserve charging result.
Passwordstorage computation machine 130 is computing machines that the password management merchant-password storage company has, and uses private line access with communication common carrier end computing machine 120.This passwordstorage computation machine 130 comprises password storeddata base 140, the password of storing communication companyend computing machine 120 distribution.
Password authentication computing machine 170 is computing machines that the password management merchant-password authentication company has, and uses private line access with passwordstorage computation machine 130, comprisespassword authentication database 180.
Thewebserver 160 is the servers that connect on the network, as the Web server that sends web pages etc. through the Internet toNetwork Termination #1 50.
Network Termination #1 50 is machines that user's spendable (for example the user has) possesses browser, built-in CPU, ROM, RAM, hard disk, display, various IO interface etc., possess browser and e-mail function, possess thewebserver 160 that connects on the access the Internet and receive page info (for example wait and describe) and be presented on the display or receive the function that various content informations use with HTML.
In addition, communication common carrierend computing machine 120, passwordstorage computation machine 130, password authentication computing machine 170, thewebserver 160 general server computer of CPU, ROM, RAM, hard disk, various IO interface etc. that has been built-in.
Communication common carrierend computing machine 120 sends picture 111a shown in Figure 6 according to the visit frommobile phone 110 as the information (html data) of browser display on display device that is used for mobile phone 110.On this picture 111a, the price of arranging the password that can buy.The display part that " 100 yen " " 200 yen " " 300 yen " are arranged like this is linked to the program A of the download charging content shown in the amount of money that generates this demonstration respectively.The display part of " 100 yen " of picture 111a, " 200 yen ", " 300 yen " can be selected by the operating portions such as button of operatinghandset 110, under the situation of having been undertaken selecting by user's operation input,mobile phone 110 access links are to the program A (S1 of Fig. 6) of the part of selecting, and communication common carrierend computing machine 120 is carried out this program A.
By carrying out this program A, communication common carrierend computing machine 120 carries out the password shown in the process flow diagram of Fig. 7 and generates and handle.
Generate in the processing at password shown in Figure 7, in S110, the not shown circuit switch that communication common carrierend computing machine 120 possesses from mobile operator is obtained the telephone number of access side'smobile phone 110; In the S120 that follows, obtain the current time on date from the real-time clock that communication common carrierend computing machine 120 possesses; In the S130 that follows, carry out password according to these information and calculate.
The content of the detailed process of this password calculating below is shown.
1. according to the time of obtaining among the S120 on date, generate following character string (text data).
1. date Hour Minute Second
2. second timesharing day month year
The value that relatively generates 1., 2. and from be worth a big side the little side of the value of deducting.(carrying out subtraction)
3. and then with above-mentioned 2. value add the cell-phone telephone number of obtaining among the S110.(stage 1 password)
4. the result is encrypted.For example, preferably, generate the password of each different pattern by changing the encryption coefficient (password generation coefficient) that uses when encrypting at any time.Like this, generate coefficient, can improve the security that prevents so-called password decoding etc. by regular change password.
5. be character string withstage 1 password transforming of calculating in above-mentioned 3., carry out numerical transformation, calculate the remainder of this value divided by 36 gained from per 2 characters ahead.Corresponding this operation,generation phase 2 passwords of repeating with number of characters.
6. onstages 2 password that in above-mentioned 5., generates amount of money division is appended on the specific character position, generate password.
For example, as the example of the password that generates, by the hyphen that adds as described below, the position that the enough hyphens of energy position decides the amount of money to divide.In addition, when authentication, for example read this hyphen position in advance, can divide and other parts by the SEPARATION OF GOLD forehead.
Example:
100-456-789-0ab (100 part is represented 100 yen)
ABCD-abcd-E0 (part of E0 is represented 500 yen)
12CD-5fg-1-00-100 (part of 1-and-100 is 1000 yen of 1100,1100 expressions altogether)
Then, in the S140 of Fig. 7, the password that generates among the S130 is sent to password storage computation machine 130 (S2 of Fig. 6) through special line.By so only sending password, can improve buyer's anonymity.In addition, utilize the actual telephone number that has carried out the mobile phone of visit to generate password, so for example can not know issued effective password fromNetwork Termination #1 50.Therefore, for example can not be vulnerable to password decodes.
After passwordstorage computation machine 130 receives password from communication common carrierend computing machine 120, carry out the processing shown in the process flow diagram of Fig. 8.
That is, passwordstorage computation machine 130 searches for from communication common carrierend computing machine 120 whether be stored in (S3 of Fig. 6) the password storeddata base 140 through the password that special line receives in S210.Be not stored in (S210: "No"), transfer to S220, the password that receives is stored in the password storeddata base 140 under the situation in the password storeddata base 140 at the password that receives.And under the password that receives is stored in situation in the password stored data base 140 (S210: "Yes"), retransmit passwords (S4 of Fig. 6) through special line request communication common carrierend computing machine 120.
Then, communication common carrierend computing machine 120 in S150 shown in Figure 7, (S150: "Yes"), transfer to S120, regenerate password once more and send under the situation of passwordstorage computation machine 130 request repeat passwords.Can make password like this is unique value.
And in time-out time (S150: "No"), transfer to S160 under the situation of request repeat password not.
In S160, password is sent to mobile phone (S5).Consequently, on the display device ofmobile phone 110, for example thepicture 111b ofimage pattern 6 shows password like that.
In the S170 that follows,, this password carries out download charging on themobile phone 110 to being downloaded to.The method of this charging uses the method identical with existing download charging (charging of so-called official web page) to carry out.For example, as charging result, with cell-phone telephone number, the charging amount of money (being 100 yen in above-mentioned example) and time on date of downloading (sending the time on date of password) with provide the password management merchant's of this program A the ID of company to be associated to store (S6 of Fig. 6) in thebilling database 125 into.
Like this, the framework of the enough existing download chargings of user's energy will be presented on themobile phone 110 with the password that the amount of money of selecting is bought.The metering data of storage for example amounted to and comes together to take over mobile phone charge (M1 of Fig. 6) in thebilling database 125 every 1 month by each user.For example also can be similarly to Example 1, send the data ofbilling database 125 and carry out account transfer to the account of mobile operator to the computing machine of bank from user's account.
Like this, by making the computing machine (communication common carrier end computing machine 120) that generates password and the computing machine (password storage computation machine 130) of password stored is different computing machines, and as the content of storing, store the password that does not directly comprise personal information such as cell-phone telephone number, can guarantee security, realize paying attention to the system of privacy, safe charge system can be provided.
The password that is presented at like this on themobile phone 110 can be utilized by website the Internet on corresponding with this password (for example thewebserver 160 provide the page).
That is, the user visits thewebserver 160 of desired paid content by browser etc. withNetwork Termination #1 50.Thewebserver 160 will be used for the information (html data) that the picture 151 of entering password is presented on the display device ofNetwork Termination #1 50 is sent toNetwork Termination #1 50 through network, on the browser of the display device ofNetwork Termination #1 50, show the picture 151 of entering password.
The input equipments such as keyboard that users from networks terminal 150 comprises are input to picture 151 (H1 of Fig. 6) with the password that shows on the mobile phone 110.Then,Network Termination #1 50 sends to the webserver 160 (S7 of Fig. 6) with the password of input.
Thewebserver 160 is receiving under the situation of password fromNetwork Termination #1 50 through the Internet, carries out the program of the program C shown in the process flow diagram of Fig. 9.
Thewebserver 160 sends to the password that receives password authentication computing machine 170 (S8 of Fig. 6) in S310.
The password authentication computing machine 170 that receives password from thewebserver 160 carries out the processing of the program D shown in the process flow diagram of Figure 10.
Password authentication computing machine 170 will send to password storage computation machine 130 (S9 of Fig. 6) through special line from the password that thewebserver 160 receives in S510.
The passwordstorage computation machine 130 that receives password from password authentication computing machine 170 carries out the processing of the program B shown in the process flow diagram of Figure 11.
130 search of password storage computation machine also judge whether the password that receives from password authentication computing machine 170 is stored in (S10 of Fig. 6) the password stored data base 140.Be not stored in (S710: "No"), transfer to S720, " NG " sent to password authentication computing machine 170 (S11 of Fig. 6) under the situation the password storeddata base 140 at the password that receives from password authentication computing machine 170 as authentication result.And be stored in (S710: "Yes"), transfer to S730 under the situation the password storeddata base 140 at the password that receives from password authentication computing machine 170.Like this, only need to compare password and get final product, so can handle at a high speed.
Among the S730, " OK " sent to password authentication computing machine 170 (S11 of Fig. 6) as authentication result.In the S740 that follows, from the password stored data base, delete this password then.By such deletion, can make and to reuse password.
Password authentication computing machine 170 receives authentication result from passwordstorage computation machine 130 in the S520 of Figure 10.Then, in S530, judge whether authentication result is " OK ".
In authentication result (S530: "Yes"), transfer to S540 under the situation of " OK "; And in authentication result (S530: "No"), transfer to S560 under the situation of " NG ".
In S540, the URL of the website of thewebserver 160 of the transmitting terminal of password is stored in the password authentication database 180.Then, with authentication result " OK " the transmitting terminal webserver 160 (S13 of Fig. 6).
And in authentication result (S530: "No") transfer to S560, authentication result " NG " is sent to the webserver 160 (S13 of Fig. 6) under the situation of " NG ".
Thewebserver 160 receives authentication result from password authentication computing machine 170 in the S320 of Fig. 9, in S330, judge whether this authentication result is " OK ".
In authentication result under the situation of " OK " (S330: "Yes"), transfer to S340, the URL of paid content is sent toNetwork Termination #1 50 (S14 of Fig. 6).Consequently,Network Termination #1 50 can be obtained paid content from this URL.
And in authentication result (S330: "No") under the situation of " NG ", transfer to S350, the URL that will be used for expression password invalid information is presented at data (invalid information video data) place on theNetwork Termination #1 50 sends toNetwork Termination #1 50 (S14 of Fig. 6).Consequently, onNetwork Termination #1 50, show that password is invalid.
Like this, the user buys password by downloading withmobile phone 110, the password on themobile phone 110 has been downloaded and has been presented in input on the website of thewebserver 160 of visiting withNetwork Termination #1 50, and the enough NetworkTermination #1s 50 of energy are obtained the paid content that exists from the URL of the paid content of thewebserver 160 transmissions.Thus, can for example use or download paid content.
From mobile operator to cost that the user takes over for example every 1 month withbilling database 125 password management merchant's the ID of company of storage be that keyword is added up, the amount of money of statistics is transferred into the password storage merchant's of registered in advance account (M2 of Fig. 6).Can give the password management merchant with the cost of withholding like this.Then, the password management merchant distributes to each content supplier according to the ratio of each URL of storage in the password authentication database 180.By chargeing/pay collection charges/distribution, content supplier can collect the cost of paid content like this.
By above-mentionedinfosystem 2, existing credit card payment sends card number like that and uneasiness in the security that causes has also been eliminated, can be safely and easily pay the cost of paid content.For example, can enoughmobile phones 110 buy password in advance, withNetwork Termination #1 50 use contents etc. the time, use this password.
Communication common carrierend computing machine 120 can be the computing machine of ISP with the 1st embodiment equally also.In addition, password stored data base andpassword authentication database 180 also can be made of the computing machine of database special use, are independent of passwordstorage computation machine 130 and password authentication computing machine 170.In addition, passwordstorage computation machine 130 and password authentication computing machine 170 also can be made of 1 computing machine.
In addition, preferably for example follow the S360 of Fig. 9, the address of theNetwork Termination #1 50 of invalid password is sent in storage, or the like, under the situation that outnumbers some of this address, under the situation that has sent password from this address, do not carry out the processing below the S310.Like this, can reduce the processing burden of thewebserver 160/ password authentication computing machine 170/ passwordstorage computation machine 130 etc. of (for example under the situation such as mischief or unauthorized access) under the situation of having imported invalid password.